Sciweavers

637 search results - page 104 / 128
» The Case for Abstracting Security Policies
Sort
View
130
Voted
INFOCOM
1999
IEEE
15 years 6 months ago
Multicast-Based Inference of Network-Internal Characteristics: Accuracy of Packet Loss Estimation
Abstract--We explore the use of end-to-end multicast traffic as measurement probes to infer network-internal characteristics. We have developed in an earlier paper [2] a Maximum Li...
Ramón Cáceres, Nick G. Duffield, Jos...
143
Voted
DATE
2009
IEEE
119views Hardware» more  DATE 2009»
15 years 5 months ago
Predictive models for multimedia applications power consumption based on use-case and OS level analysis
—Power management at any abstraction level is a key issue for many mobile multimedia and embedded applications. In this paper a design workflow to generate system-level power mo...
Patrick Bellasi, William Fornaciari, David Siorpae...
EUROPAR
2008
Springer
15 years 3 months ago
DGSim: Comparing Grid Resource Management Architectures through Trace-Based Simulation
Abstract. Many advances in grid resource management are still required to realize the grid computing vision of the integration of a worldwide computing infrastructure for scientifi...
Alexandru Iosup, Omer Ozan Sonmez, Dick H. J. Epem...
CLIMA
2004
15 years 3 months ago
Verifying Protocol Conformance for Logic-Based Communicating Agents
Communication plays a fundamental role in multi-agents systems. One of the main issues in the design of agent interaction protocols is the verification that a given protocol implem...
Matteo Baldoni, Cristina Baroglio, Alberto Martell...
ENTCS
2007
84views more  ENTCS 2007»
15 years 1 months ago
A Rewriting Logic Framework for Soft Constraints
Soft constraints extend classical constraints to deal with non-functional requirements, overconstrained problems and preferences. Bistarelli, Montanari and Rossi have developed a ...
Martin Wirsing, Grit Denker, Carolyn L. Talcott, A...